Security devicesLaajuus (5 cr)
Code: KT00FE06
Credits
5 op
Responsible person
- Kimmo Kääriäinen
Objective
You are able to implement effective information security solutions using various security devices.
You are able to implement technical information security controls based on information security policies.
You are able to design and implement virtual private networks.
You are able to identify and combat various threats posed on data networks and end points.
Content
How are information security solutions implemented with different security devices?
How are technical information security controls derived from information security policies?
How are virtual private networks designed and implemented?
How do you identify and prepare for various threats targeted at information networks?